A
-
Acceleration limits
Time-Distance Optimal Trajectory Planning For Mobile Robots On Straight And Circular Paths [Volume 5, Issue 2, 2014, Pages 23-36]
-
Alignment tools
Improved Alignment of Bisulfite Sequencing Data Using CpG Islands [Volume 5, Issue 2, 2014, Pages 1-5]
-
Anti-lock Braking System (ABS)
Optimal Type-2 Fuzzy Controller for Anti-lock Braking Systems [Volume 5, Issue 1, 2014, Pages 1-12]
-
Anti-lock Braking System (ABS)
Optimization of Bang-of-Bang TS-Fuzzy Based via DARLA Technique for ABS System [Volume 5, Issue 3, 2014, Pages 1-12]
-
AODV protocol
Investigating the Effect of Black Hole Attack on AODV and DSR routing protocols in Wireless Ad Hoc network [Volume 5, Issue 1, 2014, Pages 13-18]
-
Architectural styles
An Analytical algorithm of component-Based Heterogeneous Software Architectural Styles performance prediction [Volume 5, Issue 3, 2014, Pages 85-100]
-
Artifact reduction
New Strategy for Stopping Sifting Process during Bio-signals De-nosing By EMD: In Case of Low Frequency Artifact Reduction from ECG and EMG [Volume 5, Issue 4, 2014, Pages 9-21]
-
Autonomous Underwater Vehicle
IPSO-SQP Algorithm for Solving Time Optimal Bang-Bang Control Problems and Its Application on Autonomous Underwater Vehicle [Volume 5, Issue 2, 2014, Pages 69-88]
B
-
Bee Colony algorithm
Intrusion Detection System in Computer Network Using Hybrid Algorithms (SVM and ABC) [Volume 5, Issue 4, 2014, Pages 43-52]
-
Bee Colony algorithm
RISE Feedback Control Design for RLED Robot Manipulator Using Bees Algorithm [Volume 5, Issue 4, 2014, Pages 53-65]
-
Biometric attributes
Presenting a New Text-Independent Speaker Verification System Based on Multi Model GMM [Volume 5, Issue 4, 2014, Pages 67-78]
-
Bisulfite sequencing
Improved Alignment of Bisulfite Sequencing Data Using CpG Islands [Volume 5, Issue 2, 2014, Pages 1-5]
-
Buffering
Presenting a Fault Tolerant Mechanism for Buffering Fault in Network on Chips [Volume 5, Issue 2, 2014, Pages 59-68]
C
-
Classification
Intrusion Detection System in Computer Network Using Hybrid Algorithms (SVM and ABC) [Volume 5, Issue 4, 2014, Pages 43-52]
-
Classification
RISE Feedback Control Design for RLED Robot Manipulator Using Bees Algorithm [Volume 5, Issue 4, 2014, Pages 53-65]
-
Clustering
Proposing a Novel Algorithm for Fault-Tolerant Relay Node Placement in Wireless Sensor Networks [Volume 5, Issue 1, 2014, Pages 53-60]
-
Clustering
A Routing Algorithm based on Fuzzy Clustering and Minimum Cost Tree (FCMCT) in Wireless Sensor Network [Volume 5, Issue 3, 2014, Pages 113-123]
-
Collaborative Filtering
An Optimal Similarity Measure for Collaborative Filtering Using Firefly Algorithm [Volume 5, Issue 3, 2014, Pages 101-111]
-
Common Spatial Patterns(CSP)
Common Spatial Pattern for Human Identification Based on Finger Vein Images in Radon space [Volume 5, Issue 4, 2014, Pages 31-42]
-
Contract Net Protocol
Multi-Robot Foraging Based on Contract Net Protocol [Volume 5, Issue 1, 2014, Pages 61-67]
-
Cuckoo Optimization Algorithm (COA)
Cuckoo Optimization Algorithm in Cutting Conditions During Machining [Volume 5, Issue 2, 2014, Pages 45-57]
-
Curvelet Transform
MRI and PET Image Fusion by Using Curvelet Transform [Volume 5, Issue 4, 2014, Pages 23-30]
D
-
Decision Trees (DT)
Presenting a New Text-Independent Speaker Verification System Based on Multi Model GMM [Volume 5, Issue 4, 2014, Pages 67-78]
-
Discrete Action Reinforcement Learning Automata (DARLA)
Optimal Type-2 Fuzzy Controller for Anti-lock Braking Systems [Volume 5, Issue 1, 2014, Pages 1-12]
-
Discrete Action Reinforcement Learning Automata (DARLA)
Optimization of Bang-of-Bang TS-Fuzzy Based via DARLA Technique for ABS System [Volume 5, Issue 3, 2014, Pages 1-12]
-
Distributed Artificial Intelligence
Multi-Robot Foraging Based on Contract Net Protocol [Volume 5, Issue 1, 2014, Pages 61-67]
-
DNA methylation
Improved Alignment of Bisulfite Sequencing Data Using CpG Islands [Volume 5, Issue 2, 2014, Pages 1-5]
-
DNA String
Data Steganography on VoIP through Combination of Residue Number System and DNA Sequences [Volume 5, Issue 2, 2014, Pages 7-22]
-
DSR protocol
Investigating the Effect of Black Hole Attack on AODV and DSR routing protocols in Wireless Ad Hoc network [Volume 5, Issue 1, 2014, Pages 13-18]
E
-
ECG
New Strategy for Stopping Sifting Process during Bio-signals De-nosing By EMD: In Case of Low Frequency Artifact Reduction from ECG and EMG [Volume 5, Issue 4, 2014, Pages 9-21]
-
Economic load dispatch
Economic Load Dispatch with Considering the Valve-Point Effects and Ramp Rate Limits of Generators Using Evolutionary Algorithms [Volume 5, Issue 3, 2014, Pages 69-84]
-
EMD
New Strategy for Stopping Sifting Process during Bio-signals De-nosing By EMD: In Case of Low Frequency Artifact Reduction from ECG and EMG [Volume 5, Issue 4, 2014, Pages 9-21]
-
EMG
New Strategy for Stopping Sifting Process during Bio-signals De-nosing By EMD: In Case of Low Frequency Artifact Reduction from ECG and EMG [Volume 5, Issue 4, 2014, Pages 9-21]
-
Ensemble Classifiers
Presenting a New Text-Independent Speaker Verification System Based on Multi Model GMM [Volume 5, Issue 4, 2014, Pages 67-78]
F
-
Face Identification
Novel Texture Description and Face Identification Methods by Defining Bridle Paths and Using Gabor Phases [Volume 5, Issue 3, 2014, Pages 35-53]
-
False positive reduction
Detection of Pulmonary Nodules in CT Images Using Template Matching and Neural Classifier [Volume 5, Issue 1, 2014, Pages 19-28]
-
Fault Tolerance
Proposing a Novel Algorithm for Fault-Tolerant Relay Node Placement in Wireless Sensor Networks [Volume 5, Issue 1, 2014, Pages 53-60]
-
Fault tolerance router
Presenting a Fault Tolerant Mechanism for Buffering Fault in Network on Chips [Volume 5, Issue 2, 2014, Pages 59-68]
-
Finger Vein Recognition
Common Spatial Pattern for Human Identification Based on Finger Vein Images in Radon space [Volume 5, Issue 4, 2014, Pages 31-42]
-
Finite Element Analysis
(FEA)
Comparison of Conventional Salient-Pole Synchronous Generators and Permanent-Magnet-Assisted Salient-Pole Synchronous Generators based on Finite Element Analysis [Volume 5, Issue 2, 2014, Pages 89-96]
-
Fixed-structure
Flexible Beam Robust Loop Shaping Controller Design Using Particle Swarm Optimization [Volume 5, Issue 3, 2014, Pages 55-67]
-
Flexible beam
Flexible Beam Robust Loop Shaping Controller Design Using Particle Swarm Optimization [Volume 5, Issue 3, 2014, Pages 55-67]
-
Foraging Robots
Multi-Robot Foraging Based on Contract Net Protocol [Volume 5, Issue 1, 2014, Pages 61-67]
-
Fusion Rules
MRI and PET Image Fusion by Using Curvelet Transform [Volume 5, Issue 4, 2014, Pages 23-30]
-
Fuzzy Controller
Optimization of Bang-of-Bang TS-Fuzzy Based via DARLA Technique for ABS System [Volume 5, Issue 3, 2014, Pages 1-12]
-
Fuzzy logic
A Routing Algorithm based on Fuzzy Clustering and Minimum Cost Tree (FCMCT) in Wireless Sensor Network [Volume 5, Issue 3, 2014, Pages 113-123]
-
Fuzzy logic
Fuzzy Threat Assessment on Service Availability with Data Fusion Approach [Volume 5, Issue 4, 2014, Pages 79-90]
G
-
Gabor Wavelet
Novel Texture Description and Face Identification Methods by Defining Bridle Paths and Using Gabor Phases [Volume 5, Issue 3, 2014, Pages 35-53]
-
Gaussian Mixture Model (GMM)
Presenting a New Text-Independent Speaker Verification System Based on Multi Model GMM [Volume 5, Issue 4, 2014, Pages 67-78]
-
Genetic algorithm (GA)
Cuckoo Optimization Algorithm in Cutting Conditions During Machining [Volume 5, Issue 2, 2014, Pages 45-57]
-
Grid
Improving Reliability through Selecting Data in Grid Distributed System and Comparing it with Other Presented Algorithms [Volume 5, Issue 2, 2014, Pages 37-44]
H
-
Harmony search
Order reduction by minimizing integral square error and H∞ norm of error [Volume 5, Issue 1, 2014, Pages 29-42]
-
Heterogeneous styles
An Analytical algorithm of component-Based Heterogeneous Software Architectural Styles performance prediction [Volume 5, Issue 3, 2014, Pages 85-100]
-
H_∞loop shaping
Flexible Beam Robust Loop Shaping Controller Design Using Particle Swarm Optimization [Volume 5, Issue 3, 2014, Pages 55-67]
-
H∞ norm
Order reduction by minimizing integral square error and H∞ norm of error [Volume 5, Issue 1, 2014, Pages 29-42]
-
Huffman Algorithm
Data Steganography on VoIP through Combination of Residue Number System and DNA Sequences [Volume 5, Issue 2, 2014, Pages 7-22]
I
-
ICA Algorithm
Improving Short-Term Wind Power Prediction with Neural Network and ICA Algorithm and Input Feature Selection [Volume 5, Issue 3, 2014, Pages 13-34]
-
Image Fusion
MRI and PET Image Fusion by Using Curvelet Transform [Volume 5, Issue 4, 2014, Pages 23-30]
-
Imperialist Competitive Algorithm (ICA)
Cuckoo Optimization Algorithm in Cutting Conditions During Machining [Volume 5, Issue 2, 2014, Pages 45-57]
-
Information fusion
Fuzzy Threat Assessment on Service Availability with Data Fusion Approach [Volume 5, Issue 4, 2014, Pages 79-90]
-
Integral square error
Order reduction by minimizing integral square error and H∞ norm of error [Volume 5, Issue 1, 2014, Pages 29-42]
-
Intrusion Detection System
Intrusion Detection System in Computer Network Using Hybrid Algorithms (SVM and ABC) [Volume 5, Issue 4, 2014, Pages 43-52]
-
Intrusion Detection System
RISE Feedback Control Design for RLED Robot Manipulator Using Bees Algorithm [Volume 5, Issue 4, 2014, Pages 53-65]
-
IPSO-SQP Algorithm
IPSO-SQP Algorithm for Solving Time Optimal Bang-Bang Control Problems and Its Application on Autonomous Underwater Vehicle [Volume 5, Issue 2, 2014, Pages 69-88]
-
ITS
Taxonomy of Intelligent Transportation Systems (VANET): A Survey [Volume 5, Issue 1, 2014, Pages 69-82]
L
-
Linearization techniques
On the Linearization of Zinc Models [Volume 5, Issue 4, 2014, Pages 1-8]
-
Linear Programming
On the Linearization of Zinc Models [Volume 5, Issue 4, 2014, Pages 1-8]
-
Local Entropy Thresholding
Common Spatial Pattern for Human Identification Based on Finger Vein Images in Radon space [Volume 5, Issue 4, 2014, Pages 31-42]
M
-
Magnetic Saturation
Comparison of Conventional Salient-Pole Synchronous Generators and Permanent-Magnet-Assisted Salient-Pole Synchronous Generators based on Finite Element Analysis [Volume 5, Issue 2, 2014, Pages 89-96]
-
Markov model
An Analytical algorithm of component-Based Heterogeneous Software Architectural Styles performance prediction [Volume 5, Issue 3, 2014, Pages 85-100]
-
Mobile Robots
Time-Distance Optimal Trajectory Planning For Mobile Robots On Straight And Circular Paths [Volume 5, Issue 2, 2014, Pages 23-36]
-
Mobility
Taxonomy of Intelligent Transportation Systems (VANET): A Survey [Volume 5, Issue 1, 2014, Pages 69-82]
-
Model reduction
Order reduction by minimizing integral square error and H∞ norm of error [Volume 5, Issue 1, 2014, Pages 29-42]
-
MPF
New Strategy for Stopping Sifting Process during Bio-signals De-nosing By EMD: In Case of Low Frequency Artifact Reduction from ECG and EMG [Volume 5, Issue 4, 2014, Pages 9-21]
-
Multi-Agent Systems
Multi-Robot Foraging Based on Contract Net Protocol [Volume 5, Issue 1, 2014, Pages 61-67]
-
Multilayer Perceptron (MLP) Neural Network
Common Spatial Pattern for Human Identification Based on Finger Vein Images in Radon space [Volume 5, Issue 4, 2014, Pages 31-42]
-
Multiscale Geometric Analysis
MRI and PET Image Fusion by Using Curvelet Transform [Volume 5, Issue 4, 2014, Pages 23-30]
N
-
Network lifetime
A Routing Algorithm based on Fuzzy Clustering and Minimum Cost Tree (FCMCT) in Wireless Sensor Network [Volume 5, Issue 3, 2014, Pages 113-123]
-
Network on chip
Presenting a Fault Tolerant Mechanism for Buffering Fault in Network on Chips [Volume 5, Issue 2, 2014, Pages 59-68]
-
Network Security
Fuzzy Threat Assessment on Service Availability with Data Fusion Approach [Volume 5, Issue 4, 2014, Pages 79-90]
-
Neural network
Observer based approach for a class of nonlinear systems using Rise feedback controller [Volume 5, Issue 1, 2014, Pages 43-51]
-
Neural Networks
Improving Short-Term Wind Power Prediction with Neural Network and ICA Algorithm and Input Feature Selection [Volume 5, Issue 3, 2014, Pages 13-34]
-
Nonlinear system
Observer based approach for a class of nonlinear systems using Rise feedback controller [Volume 5, Issue 1, 2014, Pages 43-51]
-
NS2 simulator
Investigating the Effect of Black Hole Attack on AODV and DSR routing protocols in Wireless Ad Hoc network [Volume 5, Issue 1, 2014, Pages 13-18]
O
-
Optimal PID Controller
IPSO-SQP Algorithm for Solving Time Optimal Bang-Bang Control Problems and Its Application on Autonomous Underwater Vehicle [Volume 5, Issue 2, 2014, Pages 69-88]
P
-
Particle Swarm Optimization
Flexible Beam Robust Loop Shaping Controller Design Using Particle Swarm Optimization [Volume 5, Issue 3, 2014, Pages 55-67]
-
Performance attribute
An Analytical algorithm of component-Based Heterogeneous Software Architectural Styles performance prediction [Volume 5, Issue 3, 2014, Pages 85-100]
-
Permanent Magnet-assisted
salient-pole synchronous generators (PMa-SGs)
Comparison of Conventional Salient-Pole Synchronous Generators and Permanent-Magnet-Assisted Salient-Pole Synchronous Generators based on Finite Element Analysis [Volume 5, Issue 2, 2014, Pages 89-96]
-
Pitch Programming
IPSO-SQP Algorithm for Solving Time Optimal Bang-Bang Control Problems and Its Application on Autonomous Underwater Vehicle [Volume 5, Issue 2, 2014, Pages 69-88]
-
PSO algorithm
Improving Short-Term Wind Power Prediction with Neural Network and ICA Algorithm and Input Feature Selection [Volume 5, Issue 3, 2014, Pages 13-34]
R
-
Radon transform
Common Spatial Pattern for Human Identification Based on Finger Vein Images in Radon space [Volume 5, Issue 4, 2014, Pages 31-42]
-
Recommender System
An Optimal Similarity Measure for Collaborative Filtering Using Firefly Algorithm [Volume 5, Issue 3, 2014, Pages 101-111]
-
Regression
Chaotic Time Series Prediction by Auto Fuzzy Regression Model [Volume 5, Issue 2, 2014, Pages 111-116]
-
Relay Node
Proposing a Novel Algorithm for Fault-Tolerant Relay Node Placement in Wireless Sensor Networks [Volume 5, Issue 1, 2014, Pages 53-60]
-
Residue Number System
Data Steganography on VoIP through Combination of Residue Number System and DNA Sequences [Volume 5, Issue 2, 2014, Pages 7-22]
-
RISE Feedback
Observer based approach for a class of nonlinear systems using Rise feedback controller [Volume 5, Issue 1, 2014, Pages 43-51]
-
R-MAC
MAC Protocols in Underwater Wireless Sensor Networks: Issues and Simulations [Volume 5, Issue 2, 2014, Pages 97-109]
-
Robust controller
Flexible Beam Robust Loop Shaping Controller Design Using Particle Swarm Optimization [Volume 5, Issue 3, 2014, Pages 55-67]
-
Routh criterion
Order reduction by minimizing integral square error and H∞ norm of error [Volume 5, Issue 1, 2014, Pages 29-42]
-
Routing
A Routing Algorithm based on Fuzzy Clustering and Minimum Cost Tree (FCMCT) in Wireless Sensor Network [Volume 5, Issue 3, 2014, Pages 113-123]
S
-
Security
Taxonomy of Intelligent Transportation Systems (VANET): A Survey [Volume 5, Issue 1, 2014, Pages 69-82]
-
Session Initiation Protocol (SIP)
Data Steganography on VoIP through Combination of Residue Number System and DNA Sequences [Volume 5, Issue 2, 2014, Pages 7-22]
-
Sifting process
New Strategy for Stopping Sifting Process during Bio-signals De-nosing By EMD: In Case of Low Frequency Artifact Reduction from ECG and EMG [Volume 5, Issue 4, 2014, Pages 9-21]
-
Similarity measure
An Optimal Similarity Measure for Collaborative Filtering Using Firefly Algorithm [Volume 5, Issue 3, 2014, Pages 101-111]
-
Simulated Annealing (SA)
Cuckoo Optimization Algorithm in Cutting Conditions During Machining [Volume 5, Issue 2, 2014, Pages 45-57]
-
Slotted FAMA
MAC Protocols in Underwater Wireless Sensor Networks: Issues and Simulations [Volume 5, Issue 2, 2014, Pages 97-109]
-
Software architecture
An Analytical algorithm of component-Based Heterogeneous Software Architectural Styles performance prediction [Volume 5, Issue 3, 2014, Pages 85-100]
-
Solver independence
On the Linearization of Zinc Models [Volume 5, Issue 4, 2014, Pages 1-8]
-
Steganography
Data Steganography on VoIP through Combination of Residue Number System and DNA Sequences [Volume 5, Issue 2, 2014, Pages 7-22]
-
Support Vector Machine
Intrusion Detection System in Computer Network Using Hybrid Algorithms (SVM and ABC) [Volume 5, Issue 4, 2014, Pages 43-52]
-
Support Vector Machine
RISE Feedback Control Design for RLED Robot Manipulator Using Bees Algorithm [Volume 5, Issue 4, 2014, Pages 53-65]
-
Support Vector Machine (SVM)
Presenting a New Text-Independent Speaker Verification System Based on Multi Model GMM [Volume 5, Issue 4, 2014, Pages 67-78]
-
Synchronous Generator (SG)
Comparison of Conventional Salient-Pole Synchronous Generators and Permanent-Magnet-Assisted Salient-Pole Synchronous Generators based on Finite Element Analysis [Volume 5, Issue 2, 2014, Pages 89-96]
T
-
Template matching
Detection of Pulmonary Nodules in CT Images Using Template Matching and Neural Classifier [Volume 5, Issue 1, 2014, Pages 19-28]
-
Texture Description
Novel Texture Description and Face Identification Methods by Defining Bridle Paths and Using Gabor Phases [Volume 5, Issue 3, 2014, Pages 35-53]
-
Threat Assessment
Fuzzy Threat Assessment on Service Availability with Data Fusion Approach [Volume 5, Issue 4, 2014, Pages 79-90]
-
Time Optimal Bang-Bang Control
IPSO-SQP Algorithm for Solving Time Optimal Bang-Bang Control Problems and Its Application on Autonomous Underwater Vehicle [Volume 5, Issue 2, 2014, Pages 69-88]
-
Trajectory Planning
Time-Distance Optimal Trajectory Planning For Mobile Robots On Straight And Circular Paths [Volume 5, Issue 2, 2014, Pages 23-36]
-
Type-2 fuzzy controller
Optimal Type-2 Fuzzy Controller for Anti-lock Braking Systems [Volume 5, Issue 1, 2014, Pages 1-12]
U
-
UWAN_MAC
MAC Protocols in Underwater Wireless Sensor Networks: Issues and Simulations [Volume 5, Issue 2, 2014, Pages 97-109]
V
-
VANET
Taxonomy of Intelligent Transportation Systems (VANET): A Survey [Volume 5, Issue 1, 2014, Pages 69-82]
-
Vehicle
Taxonomy of Intelligent Transportation Systems (VANET): A Survey [Volume 5, Issue 1, 2014, Pages 69-82]
-
Virtual channel
Presenting a Fault Tolerant Mechanism for Buffering Fault in Network on Chips [Volume 5, Issue 2, 2014, Pages 59-68]
-
Voice Over Internet Protocol
Data Steganography on VoIP through Combination of Residue Number System and DNA Sequences [Volume 5, Issue 2, 2014, Pages 7-22]
W
-
Water Cycle Algorithm
Economic Load Dispatch with Considering the Valve-Point Effects and Ramp Rate Limits of Generators Using Evolutionary Algorithms [Volume 5, Issue 3, 2014, Pages 69-84]
-
Wind Power Prediction
Improving Short-Term Wind Power Prediction with Neural Network and ICA Algorithm and Input Feature Selection [Volume 5, Issue 3, 2014, Pages 13-34]
Z
-
Zinc
On the Linearization of Zinc Models [Volume 5, Issue 4, 2014, Pages 1-8]
Your query does not match with any item